咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是631-640 订阅
排序:
Task-feature collaborative learning with application to personalized attribute prediction
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Zhiyong Xu, Qianqian Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China University of Chinese Academy of Sciences Beijing101408 Peng Cheng Laboratory Shenzhen518055 China
As an effective learning paradigm against insufficient training samples, Multi-Task Learning (MTL) encourages knowledge sharing across multiple related tasks so as to improve the overall performance. In MTL, a major c... 详细信息
来源: 评论
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Real-time reversible data hiding with shifting block histogr...
收藏 引用
Journal of Real-Time Image Processing
作者: Tang, Zhenjun Xu, Shijie Ye, Dengpan Wang, Jinyan Zhang, Xianquan Yu, Chuanqiang Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China School of Cyber Science and Engineering Wuhan University Wuhan430072 China School of Computer Science and Information Technology Guangxi Normal University No. 15 YuCai Road Guilin541004 China
Reversible data hiding in encrypted image (RDH-EI) is a hot topic of data hiding in recent years. Most RDH-EI algorithms do not reach desirable embedding rate and their computational costs are not suitable for real-ti... 详细信息
来源: 评论
Ensuring data confidentiality via plausibly deniable encryption and secure deletion-a survey
收藏 引用
cybersecurity 2018年 第1期1卷 106-125页
作者: Qionglu Zhang Shijie Jia Bing Chang Bo Chen Data Assurance and Communication Security Research Center Chinese Academy of SciencesBeijingChina State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Information Systems Singapore Management UniversitySingaporeSingapore Department of Computer Science Michigan Technological UniversityHoughtonUSA
Ensuring confidentiality of sensitive data is of paramount importance,since data leakage may not only endanger data owners’privacy,but also ruin reputation of businesses as well as violate various regulations like HI... 详细信息
来源: 评论
Deep learning driven interpretable and informed decision making model for brain tumour prediction using explainable AI
收藏 引用
Scientific reports 2025年 第1期15卷 19223页
作者: Khan Muhammad Adnan Taher M Ghazal Muhammad Saleem Muhammad Sajid Farooq Chan Yeob Yeun Munir Ahmad Sang-Woong Lee Pattern Recognition and Machine Learning Lab Faculty of Artificial Intelligence and Software Gachon University Seongnam-si 13557 Republic of Korea. Department of Networks and Cybersecurity Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman 19111 Jordan. Chitkara University Institute of Engineering and Technology Chitkara University Rajpura Punjab 140401 India. Department of Cyber Security NASTP Institute of Information Technology Lahore 58810 Pakistan. Center for Secure Cyber-Physical Systems (C2PS) Computer Science Department Khalifa University Abu Dhabi United Arab Emirates. chan.yeun@ku.ac.ae. University College Korea University Seoul 02841 Republic of Korea. Pattern Recognition and Machine Learning Lab Faculty of Artificial Intelligence and Software Gachon University Seongnam-si 13557 Republic of Korea. slee@gachon.ac.kr.
Brain Tumours are highly complex, particularly when it comes to their initial and accurate diagnosis, as this determines patient prognosis. Conventional methods rely on MRI and CT scans and employ generic machine lear... 详细信息
来源: 评论
Initial ASEAN digital security and interoperability standard proposal
收藏 引用
AIP Conference Proceedings 2023年 第1期2739卷
作者: Sangsuree Vasupongayya Gunawan Hutagalung Obrina Candra Chalee Vorakulpipat Doni Purnomo Parinda Wattanasri Eko Supriyanto Shukor Abd Razak Othman Ibrahim Anazida Zainal Sri Devi Ravana Hiep Cong Pham Tharith Sriv Daw Khin Myo Su Mora Hertanto Agus Winarno Prabaswari Raden Muhammad Taufik Yuniantoro Badrus Zaman Fatmawati Retna Apsari Yutika Amelia Effendi Norjihan Abdul Ghani Zarina Shukur Hamidah Ibrahim Nur Izura Udzir Marnel Peradilla Jude Michael Teves Nestor Michael Tiglao Cenon Alfonso Pg Emeroylariffion Abas Mueen Uddin Agustin Kusumayati Brian Sri Prahastuti Department of Computer Engineering Faculty of Engineering Prince of Songkla University Hatyai Songkhla 90110 THAILAND Directorate General of Post and Information Technology Ministry of Communication and Information Technology Jakarta INDONESIA Politeknik Siber dan Sandi Negara National Cyber & Crypto Agency (BSSN) Depok West Java INDONESIA Information Security Research Team at National Electronics and Computer Technology Center Bangkok THAILAND National Standardization Agency of Indonesia Jakarta INDONESIA Department of Disease Control Ministry of Public Health Mueang Nonthaburi Nonthaburi THAILAND School of Biomedical Engineering and Health Sciences Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA IJN-UTM Cardiovascular Engineering Center Institute of Human Centered Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA Faculty of Computer Science & Information Technology Universiti Malaya Kuala Lumpur MALAYSIA RMIT University Vietnam Ho Chi Minh City VIETNAM Royal University of Phnom Penh Phnom Penh CAMBODIA Yangon University of Economics Yangon MYANMAR Agency for the Assessment and Application of Technology (BPPT) Jakarta INDONESIA Faculty of Science and Technology Universitas Airlangga Surabaya East Java INDONESIA Faculty of Advanced Technology and Multidiscipline Universitas Airlangga Surabaya East Java INDONESIA Centre for Cyber Security Universiti Kebangsaan Malaysia Bangi Selangor MALAYSIA Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang Selangor MALAYSIA Computer Technology Department College of Computer Studies De La Salle University Manila PHILIPPINES Software Technology Department College of Computer Studies De La Salle University Manila PHILIPPINES Electrical and Electronics Engineering Institute University of the Philippines Diliman Quezon City P
In this work, the result of the initial attempt to propose an Association of Southeast Asian Nations (ASEAN) digital security and interoperability standard to support the mobility among ASEAN countries is presented. L...
来源: 评论
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
收藏 引用
Big Data Mining and Analytics 2018年 第4期1卷 284-296页
作者: Chenxi Yang Yang Chen Qingyuan Gong Xinlei He Yu Xiao Yuhuan Huang Xiaoming Fu School of Computer Science Fudan UniversityShanghai 200433China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of EducationShanghai 200433China Department of Communications and Networking Aalto University02150 EspooFinland Faculty of European Languages and Cultures Guangdong University of Foreign StudiesGuangzhou 510420China Institute of Computer Science University of Gottingen37077 GottingenGermany
Given that the USA and Germany are the most populous countries in North America and Western Europe,understanding the behavioral differences between American and German users of online social networks is *** this work,... 详细信息
来源: 评论
Distortion-free watermarking scheme for compressed data in columnar database  15
Distortion-free watermarking scheme for compressed data in c...
收藏 引用
15th International Joint Conference on e-Business and Telecommunications, ICETE 2018
作者: Yaqub, Waheeb Kamel, Ibrahim Aung, Zeyar Center for Cyber Security New York University Abu Dhabi United Arab Emirates Department of Electrical and Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science Khalifa University of Science and Technology Masdar Institute Abu Dhabi United Arab Emirates
Digital watermarking is an effective technique for protecting various databases against data copyright infringement, piracy, and data tampering in the columnar database. Increasing deployments of various database syst... 详细信息
来源: 评论
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures  13th
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minut...
收藏 引用
13th International Conference on Information securityand cryptology, Inscrypt 2017
作者: Li, Xiangmin Ding, Ning Lu, Haining Gu, Dawu Wang, Shanshan Xu, Beibei Yuan, Yuan Yan, Siyun Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China School of Cyber Security Shanghai Jiao Tong University Shanghai China Information Technology Co. Ltd. Hangzhou China
Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in... 详细信息
来源: 评论
Stance-In-Depth Deep Neural Approach to Stance Classification
收藏 引用
Procedia computer science 2018年 132卷 1646-1653页
作者: Gayathri Rajendran Bhadrachalam Chitturi Prabaharan Poornachandran Dept. of Computer Science and Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Amritapuri Kerala India Amrita Center for Cyber Security & Networks
Understanding the user intention from text is a problem of growing interest. The social media like Twitter, Facebook etc. extract user intention to analyze the behaviour of a user which in turn is employed for bot rec... 详细信息
来源: 评论
A blockchain-based architecture framework for secure sharing of personal health data  20
A blockchain-based architecture framework for secure sharing...
收藏 引用
20th IEEE International Conference on e-Health Networking, Applications and Services, Healthcom 2018
作者: Amofa, Sandro Sifah, Emmanuel Boateng Obour Agyekum, Kwame O.-B. Abla, Smahi Xia, Qi Gee, James C. Gao, Jianbin School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China Department of Radiology University of Pennsylvania Philadelphia United States School of Resource and Enviroment Center for Digital Health University of Electronic Science and Technology China
Health information exchanges have been popular for some time with their advantages known and widely researched. In spite of their utility in increasing provider efficiency and decreasing administrative costs, one chal... 详细信息
来源: 评论